Author(s): Kyung-Hyune Rhee, Jeong Hyun Yi
Categories: Business & Economics > Information Management, Computers > Networking, Computers > Hardware, Computers > Cryptography
Publisher: Springer
Publish date: 2015-01-22
ISBN-10: 3319150863
ISBN-13: 9783319150864
Language: English
Description: This book constitutes the thoroughly refereed proceedings of the
15th International Workshop on Information Security Applications,
WISA 2014, held on Jeju Island, Korea, in August 2014. The 30
revised full papers presented in this volume were carefully
reviewed and selected from 69 submissions. The papers are organized
in topical sections such as malware detection; mobile security;
vulnerability analysis; applied cryptography; network security;
cryptography; hardware security; and critical infrastructure
security and policy.
15th International Workshop on Information Security Applications,
WISA 2014, held on Jeju Island, Korea, in August 2014. The 30
revised full papers presented in this volume were carefully
reviewed and selected from 69 submissions. The papers are organized
in topical sections such as malware detection; mobile security;
vulnerability analysis; applied cryptography; network security;
cryptography; hardware security; and critical infrastructure
security and policy.